Exam 10: Information Security and Network Protocols

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

If communication between 2 people is overheard by a third person without extraction of any data, it is called as:

Free
(Multiple Choice)
4.9/5
(28)
Correct Answer:
Verified

D

Why these 4 elements (confidentiality, integrity, authenticity & availability) are considered fundamental?

Free
(Multiple Choice)
5.0/5
(24)
Correct Answer:
Verified

C

When you use the word it means you are protecting your data from getting disclosed.

Free
(Multiple Choice)
4.8/5
(33)
Correct Answer:
Verified

A

Transport layer Protocol consists of ______________ main components

(Multiple Choice)
4.9/5
(38)

______________means the protection of data from modification by unknown users.

(Multiple Choice)
5.0/5
(30)

This helps in identifying the origin of information and authentic user. This referred to here as ______________      

(Multiple Choice)
4.8/5
(38)

If communication between 2 people is overheard by a third person without manipulation of any data, it is called as:

(Multiple Choice)
5.0/5
(38)

Data is used to ensure confidentiality.

(Multiple Choice)
4.7/5
(32)

An attack in which the user receives unwanted amount of e- mails.

(Multiple Choice)
4.8/5
(33)

Compromising confidential information comes under ______________    

(Multiple Choice)
4.8/5
(33)

From the options below, which of them is not a threat to information security?

(Multiple Choice)
4.9/5
(37)

______________of information means, only authorised users are capable of accessing the information.

(Multiple Choice)
4.9/5
(35)

Data integrity gets compromised when and are taken control off.

(Multiple Choice)
4.9/5
(32)

When integrity is lacking in a security system, ______________     occurs.

(Multiple Choice)
4.8/5
(32)

A unique piece of information that is used in encryption.

(Multiple Choice)
4.9/5
(31)

Study of creating a d using encryption and decryption techniques.

(Multiple Choice)
4.8/5
(35)

IPSec provides ______________protocols for network layer

(Multiple Choice)
4.8/5
(39)

In layer, vulnerabilities are directly associated with physical access to networks and hardware.

(Multiple Choice)
4.7/5
(38)

______________is the practice and precautions taken to protect valuable information from unauthorised access, recording, disclosure or destruction.

(Multiple Choice)
4.9/5
(36)

In same keys are implemented for encrypting as well as decrypting the information.

(Multiple Choice)
4.8/5
(41)
Showing 1 - 20 of 23
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)